In one embodiment, a method for securely distributing secret keys for hardware devices is disclosed. A distributor server transmits to a provider server an order for hardware devices. Each hardware device has a unique identifier and at least one secret key for authentication. The provider server sends a database associated with the distributor, for each of the hardware devices, the unique identifier and an unencrypted version of the at least one secret key. In response to an order received by the distributor from a customer for a portion of the hardware devices, the distributor server provides the database the unique identifiers and an associated customer order identifier, and the distributor server provides a customer server the unique identifiers. In response to the customer logging into the database and providing the order information, the database provides the customer the unencrypted keys for the hardware devices to allow authentication.
|
20. A method for secure distribution of secret keys for hardware devices, the method comprising:
a) a distributor server of a distributor transmitting to a provider server of a provider an order for hardware devices, wherein the provider is separate and distinct from the distributor, wherein the hardware devices have unique identifiers, and wherein each respective hardware device has (i) a corresponding unique identifier of the unique identifiers and (ii) at least one secret key enabling authentication of the respective hardware device;
b) receiving from the provider server at a database associated with the distributor, the unique identifiers and unencrypted keys, wherein for each of the respective hardware devices, the database receives the corresponding unique identifier and an unencrypted key of the unencrypted keys, the unencrypted key being an unencrypted version of the at least one secret key for the respective hardware device, and wherein the distributor does not have not having general access to the unencrypted keys;
c) in response to an order received by the distributor from a customer for a portion of the hardware devices:
i) the distributor server providing the database (1) the unique identifiers corresponding to the hardware devices of the ordered portion, and (2) an associated customer order identifier for the order; and
ii) the distributor server providing a customer server the unique identifiers corresponding to the hardware devices of the ordered portion; and
d) in response to a representative of the customer logging into the database from a customer representative network and providing, via a user interface, order information for the ordered portion of the hardware devices, the database providing the customer server or the customer representative network the unencrypted keys for the hardware devices of the ordered portion to enable the customer representative network to authenticate the hardware devices of the ordered portion.
1. A method for secure distribution of secret keys for hardware devices, the method comprising:
a) a distributor server of a distributor transmitting to a provider server of a provider an order for hardware devices, wherein the provider is separate and distinct from the distributor, wherein the hardware devices have unique identifiers, and wherein each respective hardware device has (i) a corresponding unique identifier of the unique identifiers and (ii) at least one secret key enabling authentication of the respective hardware device;
b) receiving from the provider server at a database associated with the distributor the unique identifiers and unencrypted keys, wherein for each of the respective hardware devices, the database receives the corresponding unique identifier and an unencrypted key of the unencrypted keys, the unencrypted key being an unencrypted version of the at least one secret key for the respective hardware device, and wherein the distributor does not have general access to the unencrypted keys;
c) in response to an order received by the distributor from a customer for a portion of the hardware devices:
i) the distributor server providing the database (1) the unique identifiers corresponding to the hardware devices of the ordered portion, and (2) an associated customer order identifier for the order; and
ii) the distributor server providing a customer server the unique identifiers corresponding to the hardware devices of the ordered portion;
d) in response to a representative of the customer logging into the database from a customer representative network and providing, via a user interface, order information for the ordered portion of the hardware devices, the database providing the customer server or the customer representative network the unencrypted keys for the hardware devices of the ordered portion; and
e) authenticating the hardware devices of the ordered portion using the unencrypted keys for the hardware devices of the ordered portion.
12. A system for secure distribution of secret keys for hardware devices, the system comprising:
a provider server of a provider;
a distributor server of a distributor, the distributor server configured to transmit to the provider server an order for hardware devices,
wherein the provider is separate and distinct from the distributor, wherein the hardware devices have unique identifiers, and wherein each respective hardware device has (i) a corresponding unique identifier of the unique identifiers and (ii) at least one secret key enabling authentication of the respective hardware device; and
a database associated with the distributor, the database configured to receive from the provider server the unique identifiers and unencrypted keys, wherein for each of the respective hardware devices, the database receives the corresponding unique identifier and an unencrypted key of the unencrypted keys, the unencrypted key being an unencrypted version of the at least one secret key for the respective hardware device, and wherein the distributor does not have general access to the unencrypted keys;
wherein the distributor server is further configured to, in response to an order received by the distributor from a customer for a portion of the hardware devices:
provide the database (1) the unique identifiers corresponding to the hardware devices that of the ordered portion, and (2) an associated customer order identifier for the order; and
provide a customer server the unique identifiers corresponding to the hardware devices of the ordered portion;
wherein in response to a representative of the customer logging into the database from a customer representative network and providing, via a user interface, order information for the ordered portion of the hardware devices, the database is configured to provide the customer server or the customer representative network the unencrypted keys for the hardware devices of the ordered portion; and
wherein the customer representative network is configured to authenticate the hardware devices of the ordered portion using the unencrypted keys for the hardware devices.
2. The method of
3. The method of
4. The method of
each unique identifier for the hardware devices of the ordered portion;
the customer order identifier; or
a cryptographically secure unique claim UUID (cUUID).
5. The method of
6. The method of
7. The method of
8. The method of
9. The method of
10. The method of
11. The method of
13. The system of
14. The system of
15. The system of
each unique identifier for the hardware devices of the ordered portion;
the customer order identifier; or
a Hash function.
16. The system of
17. The system of
18. The system of
19. The system of
|
The present application claims the benefit of U.S. Provisional Patent Application No. 63/047,381, filed Jul. 2, 2020, which is incorporated herein by reference in its entirety.
Broadly used machine-to-machine (M2M), sensor network, and internet of things (IoT) systems implement some form of symmetric and/or asymmetric encryption, hashing functions, message authentication codes (MACs), and/or digital signatures safeguarding connected devices and networks. For low cost and low power M2M and sensor networks that use hardware devices with embedded MCUs/MPUs with limited computational power and memory, compromises have been made in the complexity of security protocols used to authenticate devices joining the network and securing the data transmitted. Examples of these protocols include ZigBee, Bluetooth, LoRaWAN, SigFox, and Zwave. Many of these protocols have decided to use symmetric encryption as the primary authentication and security method due to the benefits of symmetric encryption algorithms in terms of implementation on memory, power, and computationally-constrained MCUs and MPUs.
The exact protocol implementation and cryptography varies between industry standards, but all rely on maintaining the integrity of shared secret key (SK). There is extensive public documentation around the exact implementations of pre-shared secret key symmetric encryption.
In some cases, like LoRaWAN ABP mode, the hardware device directly encrypts data transmitted on the network with its secret key(s) stored in local memory. In other cases, like LoRaWAN OTAA mode, the hardware device uses a secret key stored in local memory to initiate a “join” process with the network where this secret key is used only to authenticate the join process and subsequently a set of dynamically created “session keys” are instantiated per the network protocol and used for subsequent communication. In all cases, there is a need to use a secret key(s) stored in the hardware device prior to joining the network as a critical part of the process of authenticating the hardware device on the network and enabling subsequent communication.
The current standards-based network protocols using secret key symmetric encryption define at least two network elements. The first network element is hardware devices. These are end-points (sensors, actuators, HMI devices, etc.) that join and send data on the network. The second network element is the network root of trust entity. This is the entity that authenticates hardware devices attempting to join a network and optionally negotiates a protocol-specific security policy. The exact terminology for this entity varies across industry standards. Examples includes Zigbee (Trust center, Zigbee router or coordinator), LoRaWAN (Join server), and Zwave (controller). The hardware devices may communicate directly with the network root of trust in star network typologies, or have their communications relayed or forwarded through other hardware devices (hop) in mesh network typologies.
One of the ongoing challenges with the current secret key symmetric encryption-based network protocols is the need to securely register the initial secret keys in both the network trust entity and the hardware device before the device can attempt to join the network. If the secrecy of this key is compromised then significant security vulnerabilities are exposed to the entire network.
In a completely vertically integrated solution scenario where one company designs, manufactures, and deploys all network elements, it would be fairly straightforward to maintain the secrecy and integrity of the secret key. The real world ecosystem and marketplace, however, is composed of multiple solution component providers and creates a need for the secure distribution of these secret keys through the multi-tiered hardware device supply chain and network deployment. Existing industry standards define how hardware devices can be registered and authenticated on these networks, but none of the standards define a process and methodology for how the pre-provisioned secret keys seeded into hardware devices memory are securely distributed through a multi-tiered hardware device supply chain and complex marketplace including hardware device OEMs/CMs, distributors/resellers, hardware device owners, network operators, owners of the data generated by hardware devices, and lessors of hardware devices.
Supply chain participants may include the following:
Due to the lack of secret key distribution innovations in the marketplace, some industry standard protocols have defined a “pairing” process where the hardware device and network root of trust both enter a less secure “pairing” mode to allow the initial authentication of the hardware device on the network. In some cases all devices use the same secret keys during the initial pairing handshake. Although allowed, this method is increasingly discouraged due to potential security vulnerabilities during the pairing process. Further, “pairing” is a manual process that requires a person to initiate the “pairing” mode on the device. For some use cases like pairing a single temperature sensor to a person's phone, the “manual” overhead of pairing is not an issue. For IoT applications that need to deploy hundreds of thousands of sensors, however, the labor cost and time of this method is prohibitive. Further the person performing the manual pairing still must be trusted to some level. Although the root secrete keys of the device are not exposed during the manual pairing process, in most cases there is nothing preventing the unpaired device from simply being provisioned to another network, in effect being stolen.
More recent updates to industry standards (example Zigbee 3.0) improve the security during pairing by requiring some type of “out of band” methodology to exchange the secret key during the initial pairing process, for example, using a cellphone with a camera to capture a QR code on the device and using the phone's “out of band” IP connection with the network root of trust to register the secret key. Although more secure than prior pairing processes, this is still a manual process and will not scale to high-volume sensor deployments due to the labor costs and security issues outlined above.
Still another marketplace workaround for the lack of a secret key distribution method is the addition of a physical hardware secure element (HSE) chip (ICs) to the hardware sensor design. Although this approach technically provides an “out of band” process for hardware device owners to extract secret keys from devices, it adds the additional cost of the ICs to the hardware endpoints. Further to extract the secret keys, the end customer must implement a software process with the IC manufactures “porthole” to actually extract the secret keys per each IC. This incurs both NRE and subscription costs. In actuality, most hardware devices (e.g., sensors, actuators) do not use HSE ICs and simply have the secret key directly programmed into the non-volatile memory of the hardware device by the hardware device OEM/CM.
In actuality, the most common methods being used in the marketplace to provide the pre-programmed secret keys within hardware devices to their purchaser (end customer) is the sensor OEM publishing them in clear text and delivering them to customers via emails, spreadsheets, flat files (CSV, etc.), or printed on labels included with hardware devices. This clear text exposure of hardware device secret keys as they move through the supply chain completely undermines the security foundation of the secret key symmetric encryption-based industry standard network protocols like LoRaWAN, Zigbee, and others.
Direct Sale (
In operation 124, the unique identifiers and secret keys are sent to the customer server 107 of the customer 106. This data 112, 114 is typically sent via CVS file, email, etc.
The customer 106 then buys, receives, and deploys the hardware device (operation 126). In operation 128, the customer registers the unique identifiers and keys by sending them to the network authority 108 for device authentication, the network authority storing the unique identifiers 112 and secret keys 114 in a database 109. The authenticated device 120 joins the network using the unique identifier and secret key(s). Such direct sales from OEMs to end customers are limited in the real-world supply chain to a limited set of large enterprises driving high volume products.
Distributor Providing Keys (
The current situation also creates a logistics problem when OEMs use distributors/resellers. In the real marketplace, OEMs manufacture hardware devices in large batches and inject unique secret keys at the time of manufacture. In most cases, the OEM does not know who will purchase a particular hardware device at the time of manufacture, and in most cases the end customer actually purchases the device from a distributor/reseller and not directly from the hardware OEM. Hardware devices are manufactured with both a public serial number(s), device unique identifiers (DUIDs), and secret keys. The public serial numbers (or MAC address/EUIs/UUID) are stored in internal non-volatile memory and typically printed in clear text on the device. The secret keys are stored in protected internal non-volatile memory of the hardware device and to maintain integrity should never be printed or shared in clear text. In many cases, hardware devices have multiple secret keys. Only the end customer should have clear-text access to the secret keys and/or securely control the process of registering the secret keys with the network root of trust.
Each of these operations 125, 127 creates a security risk. The distributor/reseller 130 must somehow connect the customer 106 to the secret keys of the devices they purchased. Today, the OEMs are including a printed secret key (or manifest of secret keys) with the shipment of products. Alternatively, they are emailing a excel spreadsheet or CVS file with the keys to distributors and/or customers.
Distributors/resellers must provide end customers buying hardware devices with the specific secret keys for each device purchased. Logistically, they must track the unique serial number of each device and its secret keys. At the time of purchase, the distributor must somehow securely deliver these secret keys to the end customers. To ensure security, the distributor/reseller should not have unprotected access to the clear-text secret keys of the devices they sell. To maintain integrity, the distributor/reseller must provide a method to cache (temporally store) and/or transfer secret keys with protected methods and processes to the end customer or enable the customer to directly control the secure delivery of the secret keys of hardware devices purchased to the network root of trust the customer selects.
The present disclosure may be directed, in one aspect, to a method or system for securely distributing secret keys for hardware devices. In one aspect, a method includes a) a distributor server of a distributor transmitting to a provider server of a provider an order for hardware devices, wherein the provider is separate and distinct from the distributor, each hardware device has a unique identifier and at least one secret key, and the at least one secret key enables authentication of the hardware device; b) receiving from the provider server at a database associated with the distributor, for each of the hardware devices, the unique identifier and an unencrypted version of the at least one secret key (the unique identifiers and the unencrypted keys), the distributor not having general access to the unencrypted keys; c) in response to an order received by the distributor from a customer for a portion of the hardware devices: i) the distributor server providing the database (1) the unique identifiers for the hardware devices of the ordered portion, and (2) an associated customer order identifier for the order; and ii) the distributor server providing a customer server the unique identifiers for the hardware devices of the ordered portion; d) in response to a representative of the customer logging into the database from a customer representative network and providing, via a user interface, order information for the ordered portion of the hardware devices, the database providing the customer server or the customer representative network the unencrypted keys for the hardware devices of the ordered portion; and e) authenticating the hardware devices of the ordered portion using the unencrypted keys for the hardware devices of the ordered portion.
In another aspect, a system includes a provider server of a provider; a distributor server of a distributor, the distributor server configured to transmit to the provider server an order for hardware devices, wherein the provider is separate and distinct from the distributor, each hardware device has a unique identifier and at least one secret key, and the at least one secret key enables authentication of the hardware device; and a database associated with the distributor, the database configured to receive from the provider server, for each of the hardware devices, the unique identifier and an unencrypted version of the at least one secret key for each of the hardware devices (the unique identifiers and the unencrypted keys), the distributor not having general access to the unencrypted keys; wherein the distributor server is further configured to, in response to an order received by the distributor from a customer for a portion of the hardware devices: provide the database (1) the unique identifiers for the hardware devices that of the ordered portion, and (2) an associated customer order identifier for the order; and provide a customer server the unique identifiers for the hardware devices of the ordered portion; wherein in response to a representative of the customer logging into the database from a customer representative network and providing, via a user interface, order information for the ordered portion of the hardware devices, the database is configured to provide the customer server or the customer representative network the unencrypted keys for the hardware devices of the ordered portion; and wherein the customer representative network is configured to authenticate the hardware devices of the ordered portion using the unencrypted keys for the hardware devices.
In yet another aspect, a method includes a) a distributor server of a distributor transmitting to a provider server of a provider an order for hardware devices, wherein the provider is separate and distinct from the distributor, each hardware device has a unique identifier and at least one secret key, and the at least one secret key enables authentication of the hardware device; b) receiving from the provider server at a database associated with the distributor, for each of the hardware devices, the unique identifier and an unencrypted version of the at least one secret key (the unique identifiers and the unencrypted keys), the distributor not having general access to the unencrypted keys; c) in response to an order received by the distributor from a customer for a portion of the hardware devices: i) the distributor server providing the database (1) the unique identifiers for the hardware devices of the ordered portion, and (2) an associated customer order identifier for the order; and ii) the distributor server providing a customer server the unique identifiers for the hardware devices of the ordered portion; and d) in response to a representative of the customer logging into the database from a customer representative network and providing, via a user interface, order information for the ordered portion of the hardware devices, the database providing the customer server or the customer representative network the unencrypted keys for the hardware devices of the ordered portion to enable the customer representative network to authenticate the hardware devices of the ordered portion.
The present disclosure will become more fully understood from the detailed description and the accompanying drawings, wherein:
The drawings represent one or more embodiments of the present invention(s).
The following description of the preferred embodiment(s) is merely exemplary in nature and is in no way intended to limit the invention or inventions. The description of illustrative embodiments is intended to be read in connection with the accompanying drawings, which are to be considered part of the entire written description. In the description of the exemplary embodiments disclosed herein, any reference to direction or orientation is merely intended for convenience of description and is not intended in any way to limit the scope of the present inventions. Relative terms such as “lower,” “upper,” “horizontal,” “vertical,” “above,” “below,” “up,” “down,” “left,” “right,” “top,” “bottom,” “front” and “rear” as well as derivatives thereof (e.g., “horizontally,” “downwardly,” “upwardly,” etc.) should be construed to refer to the orientation as then described or as shown in the drawing under discussion. These relative terms are for convenience of description only and do not require a particular orientation unless explicitly indicated as such. The discussion herein describes and illustrates some possible non-limiting combinations of features that may exist alone or in other combinations of features. Furthermore, as used herein, the term “or” is to be interpreted as a logical operator that results in true whenever one or more of its operands are true. Furthermore, as used herein, the phrase “based on” is to be interpreted as meaning “based at least in part on,” and therefore is not limited to an interpretation of “based entirely on.”
As used throughout, ranges are used as shorthand for describing each and every value that is within the range. Any value within the range can be selected as the terminus of the range. In addition, all references cited herein are hereby incorporated by referenced in their entireties. In the event of a conflict in a definition in the present disclosure and that of a cited reference, the present disclosure controls.
In the following description, where block diagrams or circuits are shown and described, one of skill in the art will recognize that, for the sake of clarity, not all peripheral components or circuits are shown in the figures or described in the description. For example, common components such as memory devices and power sources may not be discussed herein, as their role would be easily understood by those of ordinary skill in the art. Further, the terms “couple” and “operably couple” can refer to a direct or indirect coupling of two components of a circuit.
It is noted that for the sake of clarity and convenience in describing similar components or features, the same or similar reference numbers may be used herein across different embodiments or figures. This is not to imply that the components or features identified by a particular reference number are identical across each embodiment or figure, but only to suggest that the components or features are similar in general function or identity.
Features of the present inventions may be implemented in software, hardware, firmware, or combinations thereof. The computer programs described herein are not limited to any particular embodiment, and may be implemented in an operating system, application program, foreground or background processes, driver, or any combination thereof. The computer programs may be executed on a single computer or server processor or multiple computer or server processors.
Processors described herein may be any central processing unit (CPU), microprocessor, micro-controller, computational, or programmable device or circuit configured for executing computer program instructions (e.g., code). Various processors may be embodied in computer and/or server hardware of any suitable type (e.g., desktop, laptop, notebook, tablets, cellular phones, etc.) and may include all the usual ancillary components necessary to form a functional data processing device including without limitation a bus, software and data storage such as volatile and non-volatile memory, input/output devices, graphical user interfaces (GUIs), removable data storage, and wired and/or wireless communication interface devices including Wi-Fi, Bluetooth, LAN, etc.
Computer-executable instructions or programs (e.g., software or code) and data described herein may be programmed into and tangibly embodied in a non-transitory computer-readable medium that is accessible to and retrievable by a respective processor as described herein which configures and directs the processor to perform the desired functions and processes by executing the instructions encoded in the medium. A device embodying a programmable processor configured to such non-transitory computer-executable instructions or programs may be referred to as a “programmable device”, or “device”, and multiple programmable devices in mutual communication may be referred to as a “programmable system.” It should be noted that non-transitory “computer-readable medium” as described herein may include, without limitation, any suitable volatile or non-volatile memory including random access memory (RAM) and various types thereof, read-only memory (ROM) and various types thereof, USB flash memory, and magnetic or optical data storage devices (e.g., internal/external hard disks, floppy discs, magnetic tape CD-ROM, DVD-ROM, optical disk, ZIP™ drive, Blu-ray disk, and others), which may be written to and/or read by a processor operably connected to the medium.
In certain embodiments, the present inventions may be embodied in the form of computer-implemented processes and apparatuses such as processor-based data processing and communication systems or computer systems for practicing those processes. The present inventions may also be embodied in the form of software or computer program code embodied in a non-transitory computer-readable storage medium, which when loaded into and executed by the data processing and communications systems or computer systems, the computer program code segments configure the processor to create specific logic circuits configured for implementing the processes.
The following discloses methods and systems for secure distribution of pre-provisioned secret keys in hardware devices required for many M2M (machine to machine), sensor network, and IoT systems based on pre-shared secret key symmetric encryption (AES, DES, IDEA, Rcx, Blowfish) protocols to the final device owner, user, or lessor through a multi-tiered hardware device supply chain including hardware device OEMs (providers), distributors/resellers, hardware device owners, network operators, owners of the data generated by hardware devices, and lessors of hardware devices.
Database Providing Keys (
In the exemplified embodiment, the silicon manufacturer 102 provides the un-provisioned IC/hardware 116 to the provider 104 (in this embodiment an OEM, though the invention is not so limited) (operation 122). The OEM 104 has a database 110 that includes a device unique identifier (DUID) 112 and at least one secret key 114 for each hardware device. This data 112, 114 is provided to the un-provisioned device 116 to cause device 118. The at least one secret key 114 enables authentication of the hardware device.
In operation 132, rather than sending both the identifiers 112 and secret keys 114 to the distributor 130 in cleartext (un-encrypted) form, the OEM 104 only sends the identifiers 112 to the distributor 130. In operation 136, the OEM server 105 securely uploads both the unique identifiers 112 and the unencrypted secret keys 114 to the new database 140, which may be associated with the distributor 130. The data for the device may comprise a unique identifier and an unencrypted version of the at least one secret key for each of the hardware devices. Further, while the database 140 may be associated with the distributor, it may be configured such that the distributor does not have general access to the unencrypted secret keys forming part of the device data. By not having “general access,” only one or two administrators of the distributor have access to the unencrypted secret keys (e.g., cleartext access to the keys. The other representatives of the distributor only have access to the encrypted secret keys. The identifiers and secret keys are preferably uploaded using a TLS-protected IP connection.
The distributor server 131 transmits to the provider server 105 orders for hardware devices, the distributor and provider being separate and distinct entities. The distributor 130 in turn receives orders from customers to purchase some portion of the hardware devices 118 stored by distributor 130. In operation 138, in response to the customer order, the distributor server 131 provides the database 140 (1) the unique identifiers for the hardware devices that form part of the customer-ordered portion, and (2) an associated customer order identifier for the order. The customer order identifier may be, for example, a customer order number, a hash function, or some other means for identifying the customer order. In further response to the customer order, in operation 134, the distributor server sends a customer server 107 of the customer 106 the unique identifier for each of the hardware devices of the ordered portion. The unique identifiers may be sent in cleartext.
In the exemplified embodiment, a representative of the customer logs into the database 140 from a customer representative network and provides, via a user interface 107, order information for the ordered portion of the hardware devices (operation 142). This order information may be, for example, one or more of each unique identifier for the hardware devices of the ordered portion, the customer order identifier, and/or a Hash, or some other information about the customer order.
In response to the customer representative logging in and providing the order information, the database 140 provides the customer server 107 (or in other embodiments the customer representative network 108) unencrypted versions of the at least one secret key (e.g., in cleartext) for each of the hardware devices of the ordered portion (operation 144) to enable the customer representative network to authenticate the hardware devices of the ordered portion. In the exemplified embodiment, the customer server then registers the unique identifiers and secret keys (e.g., via CVS or email) with the customer representative network 108 (operation 146). The exemplified network 108 has a database 109 for storing the unique identifiers 112 and secret keys 114. The devices join the network 108 using the unique identifiers 112 and secret keys 114 and become authenticated devices 120.
It is noted that, for the sake of simplicity,
The embodiment of
Note that while the disclosed embodiment shows only a single distributor 130, the system 13 may include multiple distinct distributors each communicating with the same database 140 or with different databases, but otherwise carrying out the similar operations for providing secure authentication.
Using cUUID (
Database Provides Keys to Customer Representative Network (
This system shows how direct API integration may be supported, with the network 108 further enhancing overall security. The customer 106 may have the electronic system automatically register the secret keys with the network provider the customer chooses. This further enhances the security of the devices and network as the secret key is never exposed by the customer in the process of claiming it from the distributors system and registering it with the customer's network provider. It further reduces the logistical effort needed by the customer to manually claim the secret keys and then register them with the network provider. In the exemplified embodiment, the other operations and their components remain largely similar to
Combining Databases (
This embodiment demonstrates how the invention can support direct API integration with a provider/OEM who chooses to keep secret keys in their own provider/OEM server. The distributor provides the critical function of connecting specific devices (DUIDs) to the customers' ID (optionally generating the cUUID). In this embodiment, the end customers purchasing hardware devices from a distributor or reseller can claim the secret keys for the purchased devices directly from the hardware device provider's/OEM's secure database of device-specific secure keys via the distributor providing, for example, a unique claim value (e.g., order number or token) or a unique Hash function derived for each device purchased.
Providing Keys to Customer Representative Network (e.g., Third Party) (
Customer Leases Devices to End User (
The exemplified system 18 shows how a lessor of hardware devices can maintain the privacy of the secret keys for the devices while enabling a lessee to register the hardware device with a network root of trust 108 and access the data and functionality of the device for term of the lease. Further, the lessor has the ability to revoke the privileges of the lessee by disabling the access of secret keys to the root of trust network 108, by de-registering the device from the root of trust or by deleting the secret keys from the root of trust. This innovation is critical to the ability of networks based on shared secret key security schemes to maintain integrity by protecting the hardware device secret keys and not exposing them to lessees. Without such a system the lessor would have to provide the hardware device's secret keys to the lessee to enable them to use the device. Once the secret keys are exposed to the first lessee, it permanently compromises the integrity of the device, and potentially the networks they are used on, if the device is re-leased to another lessee in the future. There is no way to guarantee that a prior lessee properly protected the secret keys of the device they lease. The proposed process protects the hardware devices secret keys across multiple lessees.
An alternative approach to the proposed process would be to reprogram the hardware devices with new secret keys after they are reclaimed at the end of a lease. Although possible, this approach is not practical due to the lack of a standard reprogramming interface on hardware devices, costs associated with reprogramming, and the security risk enabling device reprograming (re-keying) inherently exposes.
It is noted that the lessor does not need to buy devices through a distributor or reseller for this model to work. The lessor may buy devices directly from the provider/OEM. The lessor may operate its own secret key database. Alternatively, the distributor/reseller may operate the secret key database as a service.
Multiple Lessees (
In the exemplified embodiment, the device 172 deliver secret keys to the customer/lessor 180 (operation 182). The device 172 also delivers data to the relevant networks 182, 184 (operations 186, 188), which in turn provide data to the relevant lessees 176, 178 (operations 192, 193). Lessee 176 is assigned the first secret key set 174, and lessee 178 is assigned the second secret key set 175. The lessor 180 provides the databases 183, 185 of the respective networks 182, 184 the secret keys and a control and lease profile for the lessees. In operations 194, 195, the lessees 176, 178 claims the device from the lessor 180.
For example, the PIR sensor 172 may be a motion detector in a commercial retail store and be leased to a company (lessee 176) providing a people counting data analytics service during the hours the store is open. The motion detector 172 may also be leased to a company (lessee 178) providing a security monitoring service during the hours the building is closed.
Alternatively, a temperature sensor in a freezer for food storage could be leased to the HVAC servicing company and to a company using the temperature data for FDA compliance logs. Since each lessee has their own unique key set, the hardware device may be concurrently authenticated on multiple networks corresponding to each lessee's preference.
The temperature sensor could perform two completely independent temperature measurements and data transmissions per specific lease terms that was based on 100% ownership of the sensors resources based on a time division multiplex approach. Alternatively, the lease may provide the lessee shared access to the sensor data and only a unique transmission of the data. For example, a temperature sensor may perform one temperature measurement per hour that is sent via multiple transmissions to each lessee using their unique secret key sets and sending data to each lessees preferred network.
While the inventions have been described with respect to specific examples including presently preferred modes of carrying out the inventions, those skilled in the art will appreciate that there are numerous variations and permutations of the above described systems and techniques. It is to be understood that other embodiments may be utilized and structural and functional modifications may be made without departing from the scope of the present inventions. Thus, the spirit and scope of the inventions should be construed broadly as set forth in the appended claims.
Giuliano, Jason Michael, Rancour, II, Thomas Scott
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
10237063, | Dec 13 2016 | NXP B.V.; NXP B V | Distributed cryptographic key insertion and key delivery |
10277587, | Oct 08 2015 | Apple Inc | Instantiation of multiple electronic subscriber identity module (eSIM) instances |
10326797, | Oct 03 2018 | Clover Network, LLC | Provisioning a secure connection using a pre-shared key |
10341329, | Jul 05 2017 | NXP B.V. | Method for generating a public/private key pair and public key certificate for an internet of things device |
10362037, | Jan 16 2015 | PALO ALTO NETWORKS, INC | Private cloud control |
10425242, | Oct 14 2016 | Microsoft Technology Licensing, LLC | IoT provisioning service |
10642969, | Feb 25 2015 | VeriSign, Inc. | Automating internet of things security provisioning |
5913210, | Mar 27 1998 | PRODUCT ASSOCIATION TECHNOLOGIES, LLC | Methods and apparatus for disseminating product information via the internet |
7181620, | Nov 09 2001 | Cisco Technology, Inc.; Cisco Technology, Inc | Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach |
7894606, | Nov 28 2005 | PANASONIC ELECTRIC WORKS CO , LTD | Systems and methods for facilitating secure key distribution to an embedded device |
8761401, | Aug 28 2006 | Google Technology Holdings LLC | System and method for secure key distribution to manufactured products |
9479328, | Jun 11 2013 | Amazon Technologies, Inc | Secure key provisioning |
9998925, | May 23 2014 | Apple Inc. | Electronic subscriber identity module provisioning |
20030009395, | |||
20150326567, | |||
20170200225, | |||
20180351948, | |||
20190173669, | |||
20190306227, | |||
20190356482, | |||
20200021447, | |||
20200067708, | |||
20200169460, | |||
CN107919962, | |||
CN110113164, | |||
CN110363017, | |||
EP948158, | |||
EP3306970, | |||
GB2570292, | |||
KR100649858, | |||
KR101686167, | |||
WO67145, | |||
WO2018126029, | |||
WO2019147311, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jul 02 2021 | Cal-Chip Electronics Specialty Products, Inc. | (assignment on the face of the patent) | / | |||
Jul 02 2021 | GIULIANO, JASON MICHAEL | CAL-CHIP ELECTRONICS SPECIALTY PRODUCTS, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 056744 | /0661 | |
Jul 02 2021 | RANCOUR, THOMAS SCOTT, II | CAL-CHIP ELECTRONICS SPECIALTY PRODUCTS, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 056744 | /0661 |
Date | Maintenance Fee Events |
Jul 02 2021 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Jul 15 2021 | SMAL: Entity status set to Small. |
Date | Maintenance Schedule |
Jan 25 2025 | 4 years fee payment window open |
Jul 25 2025 | 6 months grace period start (w surcharge) |
Jan 25 2026 | patent expiry (for year 4) |
Jan 25 2028 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jan 25 2029 | 8 years fee payment window open |
Jul 25 2029 | 6 months grace period start (w surcharge) |
Jan 25 2030 | patent expiry (for year 8) |
Jan 25 2032 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jan 25 2033 | 12 years fee payment window open |
Jul 25 2033 | 6 months grace period start (w surcharge) |
Jan 25 2034 | patent expiry (for year 12) |
Jan 25 2036 | 2 years to revive unintentionally abandoned end. (for year 12) |